Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
1
vote
1 answer

Risks in raising domain Functional Level from 2003 mixed to 2008 native

We are in the process of replacing all of our Windows 2003 domain controllers with Windows 2008 R2 domain controllers. Once completed, we would like to then raise the domain functional level (of our forest and the domains) from 2003 mixed mode to…
1
vote
1 answer

Apache + mod_cband, limit cband-status to certain vhosts and users

Is there a way to setup mod_cband to display cband-status for a specific vhost and for a specific user? What I want to achieve is a status page for a client that if he opens for example: http://www.example.com/cband-status, then he will get a status…
Alakdae
  • 1,233
  • 8
  • 21
1
vote
4 answers

Windows Security Dialog not showing when logging on to my server through remote desktop

I can't seem to figure out how to enable the Windows Security Dialog when logging on to my server. It works for another server we have: I know it was somewhere in the settings, but right now it connects directly to the server and gives a login…
user29600
  • 419
  • 5
  • 17
  • 30
1
vote
2 answers

Connecting to Amazon EC2 over SSH from Ubuntu

I created a EC2 instance using the standard Ubuntu 10.04 AMI. I created a private key and named it EC2-priv.ppk Now I need to connect to the instance from my Ubuntu 9.10 desktop. I'm having some problem with authentication. I tried ssh-add but it…
webnat0
  • 623
  • 2
  • 8
  • 13
1
vote
1 answer

FreeBSD 7.0 Kerberos Login over SSH, But Not Console

I assume there is an easy solution to this, but I prefer to ask before mucking up our intranet server. During a support session, my co-worker and I realized we could login in with our Kerberos credentials over SSH, but not the console (in this case…
songei2f
  • 1,934
  • 1
  • 20
  • 30
1
vote
1 answer

Apache ProxyPass/ProxyPassReverse to IIS

We have an ASP.NET web application which is mapped to a folder on an apache hosted php site using ProxyPass.ProxyPassReverse. A couple of problems being encountered. cookies are being lost which breaks the site navigation, this can be overcome by…
Dana
  • 11
  • 3
1
vote
1 answer

Authenticate domain-user credentials on unjoined virtual machine?

This question may sound silly, and perhaps a bit insane, but--is there any way to run a process on a machine not joined to a domain using credentials from a user in that domain? In my case, I'm running virtual machines installed with release…
1
vote
3 answers

Sharepoint asks for NTLM credentials for every unique URL. How do I stop it?

I'm tasked with troubleshooting a problem we're having with a SP2010 site. The app is external, and there are several clients that must connect. Some clients are receiving a crazy amount of credential requests when trying to log on. It appears to…
Camron B
  • 311
  • 1
  • 2
  • 9
1
vote
1 answer

apache2 Webdav using VirtualDocumentRoot

I'm trying to get up dynamical WebDav on my virtual hosts # http://www.example.com/test.txt -> /var/www/example.com/www/test.txt VirtualDocumentRoot /var/www/%-2.0.%-1.0/%-3+/ Dav On …
Michal Bryxí
  • 417
  • 2
  • 7
  • 17
1
vote
4 answers

Understanding Security Certificates (and their pricing)

I normally used self-signed certs, however now I need a proper one at absolutely minimal cost. Since creating a "certificate authority" with makecert really just means creating a public/private key pair, it seems pretty clear that creating a…
1
vote
2 answers

Cannot access folder locally, but can remotely

I'm having a peculiar problem on one of my servers at the moment, which seems to be related to authentication in some way, but I have no idea how to find the root of the problem. I have a folder on the server D:\Somefolder\Logs. If I am connected to…
Cylindric
  • 1,127
  • 5
  • 24
  • 45
1
vote
3 answers

Trac preferences only for authenticated users

After installing my Trac instance I removed the anonymous user since I don't want anonymous users to enter the system. However, when browsing to the Trac instance and failing to log in (authentication is handled by Apache using an htpasswd file),…
Luke
  • 3,826
  • 8
  • 36
  • 40
1
vote
0 answers

Exchange Server 2007 - Windows Integrated Authentication

I'm trying to get Exchange Server 2007 to work with Windows Integrated Authenticated unsuccessfully. At the moment it's working with Basic Authentication. I followed the instructions in here but where it says "To modify an Exchange 2007 virtual…
1
vote
1 answer

IIS6.0 Subauthentication to AD

So I have Windows 2003 with IIS6 Hosting an MVC web app that requires domain authentication. Any Good Ideas on how to do this. The errors I get is 400, 401 or service unavailable. I have followed the guides on setting up MVC Isapi however in doing…
mikedopp
  • 229
  • 2
  • 7
  • 16
1
vote
3 answers

How to allow wildcard domains in apache

I have configured apache authentication for one of my domain. I want that apache should not prompt for password for local ips and for *.myexternaldomain.com. Currently with the following configuration it is working fine for only…
Supratik
  • 2,154
  • 10
  • 51
  • 66